diff options
author | Stef Walter <stefw@redhat.com> | 2013-01-03 17:51:24 +0100 |
---|---|---|
committer | Stef Walter <stefw@redhat.com> | 2013-01-03 17:51:24 +0100 |
commit | b04f7350c3c43659c6524a2f3dcabfcbe6273bc9 (patch) | |
tree | f0665803d1ac8c628244fa086a483e443ea902cc | |
parent | 1e0bc99f4b09d050415ff8c4b5daf042c6f09715 (diff) |
Add a scope section for clarity of the problem being solved
-rw-r--r-- | specs/sharing-trust-policy.xml | 38 |
1 files changed, 23 insertions, 15 deletions
diff --git a/specs/sharing-trust-policy.xml b/specs/sharing-trust-policy.xml index 54cd6b1..22f005c 100644 --- a/specs/sharing-trust-policy.xml +++ b/specs/sharing-trust-policy.xml @@ -47,25 +47,33 @@ <para>In this document we examine a general purpose method for storing anchor certificates, and representing policy about them. We also look at blacklists and their peculiarities. We see how we can represent these in a - coherent and future-proof manner. In addition to be an extensible concept, - is relatively easy to implement and retrofit into existing code.</para> - - <para>We are dealing here with the anchor of other trust information used by a - validation algorithm that lives inside of a crypto library. This can be - viewed as part of the input to the certificate validation algorithms. - We are not dealing with the validation algorithms themselves. These are - dealt in sufficient detail in the relevant RFCs - <footnote><para>Certificate verification is dealt with in detail - in <ulink url="http://www.ietf.org/rfc/rfc5280.txt">RFC 5280</ulink>. - </para></footnote>. - While in theory it could be nice to have all crypto libraries share common - code for verification of certificates, imagining such an effort is outside - the scope of this document. This document does not conflict with such a - theoretical effort.</para> + coherent and future-proof manner. In addition to being an extensible concept, + it is relatively easy to implement and retrofit into existing code.</para> <para>By using consistent anchors and other trust information, crypto libraries can make consistent decisions about X.509 certificates.</para> + <sect2> + <title>Scope</title> + + <para>We are dealing here with the anchor information and other trust policy + information used by a validation algorithm. The algorithm itself lives + inside of a crypto library implementation. This trust policy information + can be viewed as input to the certificate validation algorithms. + We are not dealing with the validation algorithms themselves. These are + dealt in sufficient detail in the relevant RFCs + <footnote><para>Certificate verification is dealt with in detail + in <ulink url="http://www.ietf.org/rfc/rfc5280.txt">RFC 5280</ulink>. + </para></footnote>. + While in theory it could be nice to have all implementations share common + code for verification of certificates, imagining such an effort is outside + the scope of this document. This document does not conflict with such a + theoretical effort.</para> + + <para>This document attempts to represent trust policy information for X.509 + certificate validation. It does not attempt to tackle the theoretical + problem of representing all possible forms of digital trust.</para> + </sect2> </sect1> <sect1 id="background"> |